Course Outline

Introduction to PKI

  • Basic security concepts and terminology
  • Public Key Infrastructure defined
  • Digital certificates and signatures
  • Smart cards and hardware tokens
  • PKI standards and global frameworks

Basic Cryptography

  • Uses of cryptography in modern systems
  • History of cryptography and evolution of algorithms
  • Symmetric vs. asymmetric encryption
  • Diffie-Hellman key exchange
  • Hashing for data integrity

Practical Uses for Encryption and Associated Issues

  • Signed and encrypted email (S/MIME and PGP)
  • Secure web connections (HTTPS/SSL)
  • Digitally signing PDFs and documents
  • File, disk, and container encryption
  • VPNs, wireless encryption, and cloud security
  • Encryption attacks and mitigation strategies

Certificate Authorities and Certificate Lifecycle

  • Public vs. private certificate authorities
  • Regulatory compliance and CA policy frameworks
  • Types of certificates and their uses
  • CA hierarchies and trust chains
  • Operations: issuing, renewing, and revoking certificates
  • Revocation methods: CRL and OCSP
  • Key recovery and certificate templates
  • Installing and managing a CA

CSCA Standards and Passport PKI

  • Overview of CSCA (Country Signing Certification Authority)
  • Use of CSCA in Machine Readable Travel Documents (MRTDs)
  • ICAO PKD and global trust frameworks for ePassports
  • Implementing a national CSCA hierarchy
  • Certificate Master Lists and Document Signer Certificates
  • Security, compliance, and international alignment

Advanced PKI Topics and Future Trends

  • Top 5 deployment issues and lessons learned
  • Top 10 risks and recommended mitigation strategies
  • Quantum-resistant cryptography and evolving standards
  • Zero Trust Architecture and PKI integration
  • Future trends in digital identity and trust frameworks

Summary and Next Steps

Requirements

  • Familiarity with networking fundamentals
  • Basic understanding of cryptography concepts
  • General awareness of enterprise security policies

Audience

  • CIOs and Chief Security Officers
  • Security managers and internal auditors
  • IT professionals involved in implementing and securing e-commerce and enterprise systems
 21 Hours

Number of participants


Price per participant

Testimonials (3)

Upcoming Courses

Related Categories